Description | This article describes an issue where locally initiated traffic (including locally originated DNS query and ICMP traffic) incorrectly egresses via an IPsec tunnel on a FortiGate in Transparent Mode when ISDB is enabled in the destination field of the Policy-Based IPsec VPN policy. |
Scope | FortiGate v7.0.15, v7.2.10, v7.4.5, v7.6.0. |
Solution |
When Policy-Based IPsec VPN is configured on a FortiGate in Transparent Mode and ISDB is added in the destination field of the Policy-Based IPsec VPN policy, locally initiated traffic incorrectly egresses via IPSEC tunnel.
Sample Config:
config system settings
config firewall policy
Though the source IP and destination IP/port does not match the IP address and port corresponding to the Internet service, traffic may be seen misrouted over the IPSec VPN tunnel. This issue does not occur when the FortiGate is in NAT mode.
id=65308 trace_id=5 func=print_pkt_detail line=5862 msg="vd-root:0 received a packet(proto=1, 10.1.1.2:8->223.5.5.5:2048) tun_id=0.0.0.0 from local. type=8, code=0, id=8, seq=0."
id=65308 trace_id=6 func=print_pkt_detail line=5862 msg="vd-root:0 received a packet(proto=1, 10.1.1.2:9->223.5.5.5:2048) tun_id=0.0.0.0 from local. type=8, code=0, id=9, seq=0."
Workaround: Allow an additional NAT VDOM to handle DNS and other locally-originated traffic. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.